CN107194282A - It is a kind of to can verify that single keyword Top k search methods towards cloud computing - Google Patents
It is a kind of to can verify that single keyword Top k search methods towards cloud computing Download PDFInfo
- Publication number
- CN107194282A CN107194282A CN201710225029.3A CN201710225029A CN107194282A CN 107194282 A CN107194282 A CN 107194282A CN 201710225029 A CN201710225029 A CN 201710225029A CN 107194282 A CN107194282 A CN 107194282A
- Authority
- CN
- China
- Prior art keywords
- document
- retrieval result
- keyword
- code information
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Towards cloud computing single keyword Top k search methods are can verify that the invention discloses a kind of, uploaded including data and Top k retrievals and verification step, data owner encodes (HMAC) mechanism using Hash message authentications, and according to document and the partial ordering relation of the relevance score of keyword, verification code information is constructed, then outsourcing is stored to high in the clouds together with collection of document.Data consumer is when performing list keyword Top k retrievals, and Cloud Server returns to retrieval result collection of document and corresponding verification code information;Data consumer reconstructs identifying code according to the retrieval result of acquisition, realizes the integrity verification for retrieval result.The agreement flow of the present invention is simple, it is easy to accomplish;It is safe, it is able to verify that whether retrieval result document data is maliciously tampered or abandons;The transmission communication cost and reconstruction calculations cost for completing the verification code information of retrieval result integrity verification are low, are conducive to increasing network utilization and recall precision.
Description
Technical field
It is that a kind of can verify that single keyword Top-k retrieval sides towards cloud computing the present invention relates to cloud computing security fields
Method.
Background technology
With the maturation of cloud computing technology, with the cloud service mould for representative such as Amazon EC2, Google App Engine
Formula is rapidly developed and application popularization.Resource outsourcing to the clouds such as increasing enterprises and individuals will be by that will store, calculating take
Provider (Cloud Service Provider, Cloud Server P) is engaged in cut operating costs.The thought of IT resource services
Become increasingly popular, the trend of " all are all serviced " (X as a Service, XaaS) is presented, " service " turns into the core of cloud computing
Concept.But while cloud computing flourishes, the problem of cloud security also turns into by extensive concern.In cloud computing environment,
User is out of hand to the data being placed in Cloud Server (Cloud Server, Cloud Server) and calculating, is for data
It is no be protected, whether calculating task is executed correctly can not all determine, it is therefore desirable to design corresponding security mechanism and system
Structure protects the confidentiality and integrity of user data.The former mainly realizes data by cryptographic means such as secret protections
Can not pry property;And the latter is primarily referred to as user and Query Result is verified, prevent data to be tampered, forge or abandon.
Currently, researchers mainly consider that the safe retrieval under semi-honesty model (Honest-but-curious) framework is asked
Topic, that is, assume that Cloud Server can come to provide data retrieval service to client in strict accordance with the agreement of agreement, but may steal
Data message.The heat of existing research work concern is had become for the Privacy Protection of file retrieval in cloud computing environment
Point problem, wherein, homomorphic cryptography technology is the conventional safe practice means of such research work with can search for encryption technology.So
And, Cloud Server observes semi-honesty model not always necessarily, and Cloud Server may not provide data according to set agreement,
Or the calculating process of data is the problems such as may be due to overload, software vulnerability and goes wrong, and causes to return to user's
Retrieval result is incorrect or not comprehensive.Paid close attention to for retrieval result integrity issue is less by researcher, in fact, some
Field, the integrity demands of retrieval result are particularly important, and data privacy is not essential sometimes.For example, being handed in security
Easy field, any stock is all disclosed to valency fetched data, does not have private requirement, each user can
To check these data;And can return and meet the correct and complete retrieval result of specific search modes requirement and be only user
It is concerned about the most.As increasing government, enterprises and individuals are by the Data Hosting of oneself to Cloud Server, Cloud Server
The retrieval result that is caused by attack is imperfect also increasingly to cause the concern of industry.Therefore, data privacy premise is not being considered
Under, the integrality for how ensuring retrieval result is a major issue in cloud computing technology research and application.
The method having in the prior art is to provide to service this hypothesis according to " semi-honesty model " mode based on Cloud Server
, it is impossible to result of calculation is imperfect caused by checking reduces the reasons such as computing cost due to system mistake or actively;Some structures
Make verification code information complicated, and when data consumer retrieves Top-k documents, the verification code information redundancy of return is big, causes
Communication efficiency and reconstruct checking code efficiency are all than relatively low.
The content of the invention
Towards cloud computing single keyword Top-k search methods are can verify that it is an object of the invention to provide a kind of.By this
The method provided is invented, data consumer can verify to k document of retrieval result, so that it is determined that retrieval result is
It is no to be tampered or abandon, determine the authenticity and integrity of result.
It is a kind of to can verify that single keyword Top-k search methods towards cloud computing, comprise the following steps:
Data owner constructs verification code information;For each keyword in keyword set, calculate in collection of document
The degree of correlation and sequence of each document with the keyword, according to relevancy ranking sequential configuration verification code information;
Collection of document and verification code information are sent to Cloud Server by data owner, are retrieved for data consumer, described
The process of the retrieval request of the Cloud Server processing data consumer is as follows:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction
The number of documents for needing to retrieve for specified collection of document, keyword and the data consumer;
S2, the Cloud Server calculate the document sets specified according to the collection of document specified and the keyword
With the maximally related k document of the keyword in conjunction, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the document of data consumer's needs
Quantity, if it is sends retrieval result collection of document and the corresponding verification code information of document to data consumer together;It is no
Then return to step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieve
Result verification fails, and retrieval result such as is tampered, abandoned at the attack, and Top-k is retrieved and verification process terminates;
The degree of correlation that S4-3, data consumer are calculated between the keyword that the retrieval result document returned and retrieval are used is obtained
Divide and sort, according to the order reconstruct verification code information;
S4-4, data consumer compare verification code information and the obtained checking of reconstruct in the retrieval result of cloud service return
Whether code information is equal, the retrieval result authentication failed if unequal, and retrieval result, which is tampered, abandoned etc., attacks, Top-k
Retrieval and verification process terminate;Retrieval result is verified if equal, is true and complete retrieval result, is not passed through
The attack such as distort, abandon, Top-k retrievals and verification process terminate.
The present invention also provide it is a kind of can verify that single keyword Top-k search methods towards cloud computing, comprise the following steps:
Collection of document and verification code information that cloud server data owner sends, described verification code information by with
Lower step is obtained:For each keyword in keyword set, data owner calculates each document and institute in collection of document
The degree of correlation and the sequence of keyword are stated, according to relevancy ranking sequential configuration verification code information;
Cloud server and the retrieval request of processing data user:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction
The number of documents for needing to retrieve for specified collection of document, keyword and the data consumer;
S2, the Cloud Server calculate the document sets specified according to the collection of document specified and the keyword
With the maximally related k document of the keyword in conjunction, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the document of data consumer's needs
Quantity, if it is sends retrieval result collection of document and the corresponding verification code information of document to data consumer together;It is no
Then return to step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieve
Result verification fails, and retrieval result such as is tampered, abandoned at the attack, and Top-k is retrieved and verification process terminates;
The degree of correlation that S4-3, data consumer are calculated between the keyword that the retrieval result document returned and retrieval are used is obtained
Divide and sort, according to the order reconstruct verification code information;
S4-4, data consumer compare verification code information and the obtained checking of reconstruct in the retrieval result of cloud service return
Whether code information is equal, the retrieval result authentication failed if unequal, and retrieval result, which is tampered, abandoned etc., attacks, Top-k
Retrieval and verification process terminate;Retrieval result is verified if equal, is true and complete retrieval result, is not passed through
The attack such as distort, abandon, Top-k retrievals and verification process terminate.
Beneficial effects of the present invention:
First, safety analysis
Present invention contemplates that the verifiability of clear data retrieval result, thus the inventive method security be can
It is confirmatory.
, may not because Cloud Server observes semi-honesty model not always necessarily in Top-k retrievals and verification process
Data are provided according to set agreement, or the calculating process of data goes out the problems such as may be due to overload, software vulnerability
Existing mistake, causes the retrieval result for returning to user incorrect or not comprehensive.And this incomplete retrieval result wants to pass through
The integrity verification of data consumer, it is necessary to change corresponding verification code information, but construct the HMAC that verification code information is used
Key is shared by data consumer and data owner, and Cloud Server is maintained secrecy, and storage key is not known in Cloud Server
In the case of, the complexity for cracking Top-k confirmation of secretarial document code information is equal to and cracks hmac algorithm complexity.Therefore, reasonable selection
Hmac algorithm (such as SHA-256), it is ensured that Cloud Server can not crack the integrality of retrieval result without being used by data
Person recognizes, so as to ensure data consumer to retrieval result Top-k document integrity verifications.
2nd, communication cost is analyzed
For the Top-k retrieval services towards cloud computing, the data that data consumer really needs are according to retrieval request Q
=(DS, wq, k) return and wqMaximally related k collection of document, and the verification code information h returnedq,iIt is to be tied to ensure to retrieve
The integrality of fruit Top-k documents, for the Top-k documents that data consumer really needs, hq,iBe in order to complete retrieval
As a result integrity verification and necessary redundancy, therefore, while data consumer wishes to reach same security, identifying code
Information will be lacked as far as possible.The present invention uses retrieval result redundancy δrWeigh verification code information length and account for return retrieval result overall length
The ratio of degree.Redundancy is lower, and additional communication expense is smaller.If data consumer receives the retrieval knot of Cloud Server return
Fruit data are<ds,h’>, understand that Cloud Server returns to k retrieval result document and 1 according to Top-k retrievals and verification portion
Verification code information.Compared with the existing methods, because the verification code information of the invention returned is only comprising 1 HMAC information, and on
Method is mentioned in review text to be needed to return to k HMAC information, if verification code information is constructed using SHA-256, is saved every time logical
Letter expense is (k-1) × 256bit, so that the present invention is significantly reduced because addition verification code information is in Cloud Server and DU
Between the redundancy communication cost brought.
3rd, verification code information reconstruct costing analysis
From communication cost analysis part, data consumer retrieves every time, and return is k maximally related documents and 1
Individual verification code information, verification code information is constructed based on HMAC.Weight is so only needed to after data consumer receives retrieval result
1 verification code information of structure, compared to original method, it is possible to reduce (k-1) secondary verification code information is built, therefore the invention enables
The reconstruct cost of retrieval verification code information is effectively reduced every time.
Brief description of the drawings
Fig. 1 is that can verify that single keyword Top-k retrievals framework towards cloud computing;
Fig. 2 is the schematic flow sheet of data upload process;
Fig. 3 is the schematic flow sheet of Top-k retrievals and verification process.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention,
It is not intended to limit the present invention.
Top-k file retrievals are carried out according to single keyword under present embodiment research cloud environment, the k that checking high in the clouds is returned is individual
Whether document is and retrieves the maximally related k document of keyword that uses, and this k document is not tampered with or abandoned.It is false
If Cloud Server is designated as in CS, collection of document, comprising n document, being designated as DS={ D1,D2,…,Dn, in hot keyword set
Comprising m keyword, W={ w are designated as1,w2,w3,…,wm}.Data owner is designated as DO, and data consumer is designated as DU, and g is
The HMAC key that generation verification code information is used, g is shared by DO and DU, and CS is maintained secrecy.For keyword wqDocument DiTest
Card code information is designated as hq,i, Score (wq,Di) represent wqAnd DiRelevance score,Represent document DiRelative to key
Word wqThe degree of correlation be higher than document Dj, i.e. Score (wq,Di)>Score(wq,Dj).The query statement note that data consumer sends
For Q=(DS, wq, k), represent to obtain and searching keyword w in collection of document DSqMaximally related k document.In addition, setting
HMACg() is HMAC functions (such as SHA-256), and wherein g is key,Represent data cube computation operation.
In actual applications, k<<n.Clearly for any two different document DiAnd DjIf by the ID of document, created
The information such as time take into account, then are able to ensure that DiAnd DjThe degree of correlation for search key is unequal.Therefore, if each in DS
Document is for keyword wqThe degree of correlation there is strict partial ordering relation, i.e., for searching keyword wq, any two document and wq
The degree of correlation it is all unequal, and size can be compared.
It can verify that single keyword Top-k search methods include data and uploaded and Top-k retrievals and checking towards cloud computing
Two processes:
1st, data are uploaded
In order to realize the checking for being directed to retrieval result integrality, DO is when uploading collection of document data to CS, while attached
Band associated verification code information.When DU obtains retrieval result collection of document, retrieval result can be verified using the verification code information
Integrality.It shown below is the partial ordering relation construction identifying code letter using relevance score between document and search key
The method of breath, and the detailed process that data are uploaded is provided based on this method, as shown in Figure 2.
(1) a keyword w is measured using word frequency (Term Frequency, TF)qAnd document DiThe degree of correlation, word frequency is anti-
What is reflected is occurrence number of the word in single document, it is contemplated that the difference of Document Length, we standardize word frequency, obtain
Keyword w and document DiRelatedness computation formula is:
Wherein, | Di| it is Document Length, Di,wIt is w in DiMiddle occurrence number.
(2) DS={ D are set1,D2,…,DnIn each document for keyword wqRelevance score sequence after obtainIt is document { D as follows1,D2,…,DnConstruct on wqVerification code information { hq,1,hq,2…,
hq,n,
(3) according to the method in (2) to keyword set W={ w1,w2,…,wmIn each keyword, construct respectively
For the verification code information of each document in DS, and by document and the corresponding verification code information for keyword together
CS is uploaded to, i.e.,:
(4) CS receives and stored the data message that DO is sent.
2.Top-k is retrieved and verified
Top-k is retrieved and checking is main is completed by DU and CS cooperations, and DU sends search instruction to CS, and then CS is according to finger
Order requires to perform retrieval process, and returns to correlated results, and last DU verifies the integrality of returning result, as shown in Figure 3.Specifically
Process is as follows:
(1) DU is by search instruction Q=(DS, wq, CS k) is submitted to, CS returning result is then waited.
(2) CS receives Q, searches and includes keyword wqDocument code list, it is maximum by calculating relevance score
Preceding k document, constitutes retrieval result collection of document R, if R={ D1,D2…,Dk, and for wqMeet
Now CS is by R and verification code information hq,kDU is back to, i.e.,:
CS→DU:<R,hq,k>
(3) DU receives the results messages of CS returns<ds,h>, wherein ds is retrieval result collection of document, and h is identifying code
Information, DU performs the following verification process for being directed to retrieval result:
1. check in ds and whether include k document, if | ds | turn verification step 2. if=k establishments, otherwise ds is discontented
The retrieval result of sufficient integrity demands, retrieval is unsuccessfully exited;
2. ds={ d are set1,d2…,dk, for wqMeetNow DU is according to the key g shared with DO
Reconstruct verification code informationIfSet up, then ds
The correct retrieval result of integrity demands is as met, retrieves and successfully exits;Otherwise ds is unsatisfactory for integrity demands, retrieval failure
Exit.
On the basis of explaination above flow, an exemplary embodiments are lifted.If collection of document DS={ D1,D2,D3,D4, it is crucial
Set of words W={ w1,w2, for w1HaveSet up, for w2HaveSet up, it is therefore, right
In w1For, D1、D2、D3And D4Corresponding verification code information is respectively With
For w2For, D1、D2、D3And D4Corresponding verification code information is respectivelyWithIf DU sends retrieval request (DS, w to CS1, 3), then CS should return to R={ D1、
D2、D3AndThat is DS3(w1)={ D1,D2,D3,
DU receives the result of CS returns, checks whether in R be 3 documents, is not passed through if it is not, then verifying;Otherwise reconstruct is checked
h’1,3, check h '1,3And h1,3It is whether equal, if unequal, not by checking, pass through checking if equal.
Claims (2)
1. a kind of can verify that single keyword Top-k search methods towards cloud computing, it is characterised in that comprise the following steps:Number
Verification code information is constructed according to owner;For each keyword in keyword set, calculate in collection of document each document with
The degree of correlation of the keyword and sequence, according to relevancy ranking sequential configuration verification code information;
Collection of document and verification code information are sent to Cloud Server by data owner, are retrieved for data consumer, the cloud clothes
The process for the retrieval request that business device handles the data consumer is as follows:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction is finger
Fixed collection of document, keyword and the data consumer needs the number of documents retrieved;
S2, the Cloud Server are calculated in the collection of document specified according to the collection of document specified and the keyword
With the maximally related k document of the keyword, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the number of documents of data consumer's needs,
If it is retrieval result collection of document and the corresponding verification code information of document are sent to data consumer together;Otherwise return
Step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieval result
Authentication failed, retrieval result such as is tampered, abandoned at the attack, and Top-k retrievals and verification process terminate;
Relevance score between the keyword that the retrieval result document and retrieval that S4-3, data consumer's calculating are returned are used is simultaneously
Sequence, according to the order reconstruct verification code information;
S4-4, data consumer compare cloud service return retrieval result in verification code information and reconstruct obtain identifying code letter
Cease whether equal, the retrieval result authentication failed if unequal, retrieval result such as is tampered, abandoned at the attack, Top-k retrieve and
Verification process terminates;Retrieval result is verified if equal, is true and complete retrieval result, not by distorting, losing
The attack such as abandon, Top-k retrievals and verification process terminate.
2. a kind of can verify that single keyword Top-k search methods towards cloud computing, it is characterised in that comprise the following steps:Cloud
Server receives collection of document and the verification code information that data owner sends, and described verification code information is obtained by following steps
Arrive:For each keyword in keyword set, data owner calculates each document and the keyword in collection of document
The degree of correlation and sequence, according to relevancy ranking sequential configuration verification code information;
Cloud server and the retrieval request of processing data user:
The search instruction that S1, the cloud server are sent to the data consumer, the parameter of the search instruction is finger
Fixed collection of document, keyword and the data consumer needs the number of documents retrieved;
S2, the Cloud Server are calculated in the collection of document specified according to the collection of document specified and the keyword
With the maximally related k document of the keyword, the document is added in retrieval result set;
S3, judge whether the Top-k number of documents in the retrieval result set meets the number of documents of data consumer's needs,
If it is retrieval result collection of document and the corresponding verification code information of document are sent to data consumer together;Otherwise return
Step S2;
S4, data consumer receive the retrieval result collection of document that Cloud Server is returned, and carry out following operate:
S4-1, extract Top-k documents and verification code information;
Whether S4-2, the document checked in retrieval result are k, if it is continue executing with step S4-3;Otherwise retrieval result
Authentication failed, retrieval result such as is tampered, abandoned at the attack, and Top-k retrievals and verification process terminate;
Relevance score between the keyword that the retrieval result document and retrieval that S4-3, data consumer's calculating are returned are used is simultaneously
Sequence, according to the order reconstruct verification code information;
S4-4, data consumer compare cloud service return retrieval result in verification code information and reconstruct obtain identifying code letter
Cease whether equal, the retrieval result authentication failed if unequal, retrieval result such as is tampered, abandoned at the attack, Top-k retrieve and
Verification process terminates;Retrieval result is verified if equal, is true and complete retrieval result, not by distorting, losing
The attack such as abandon, Top-k retrievals and verification process terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710225029.3A CN107194282B (en) | 2017-04-07 | 2017-04-07 | Verifiable single keyword Top-k retrieval method facing cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710225029.3A CN107194282B (en) | 2017-04-07 | 2017-04-07 | Verifiable single keyword Top-k retrieval method facing cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107194282A true CN107194282A (en) | 2017-09-22 |
CN107194282B CN107194282B (en) | 2020-04-14 |
Family
ID=59871359
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710225029.3A Active CN107194282B (en) | 2017-04-07 | 2017-04-07 | Verifiable single keyword Top-k retrieval method facing cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107194282B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2365576A (en) * | 2000-01-31 | 2002-02-20 | Ibm | Lightweight document clustering |
US20110202526A1 (en) * | 2010-02-12 | 2011-08-18 | Korea Advanced Institute Of Science And Technology | Semantic search system using semantic ranking scheme |
CN104615692A (en) * | 2015-01-23 | 2015-05-13 | 重庆邮电大学 | Search encryption method supporting dynamic updating and multi-keyword safe ranking |
CN104768149A (en) * | 2015-03-17 | 2015-07-08 | 重庆邮电大学 | Data privacy protection and completeness verification method based on Top-k inquiry in WSN |
-
2017
- 2017-04-07 CN CN201710225029.3A patent/CN107194282B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2365576A (en) * | 2000-01-31 | 2002-02-20 | Ibm | Lightweight document clustering |
US20110202526A1 (en) * | 2010-02-12 | 2011-08-18 | Korea Advanced Institute Of Science And Technology | Semantic search system using semantic ranking scheme |
CN104615692A (en) * | 2015-01-23 | 2015-05-13 | 重庆邮电大学 | Search encryption method supporting dynamic updating and multi-keyword safe ranking |
CN104768149A (en) * | 2015-03-17 | 2015-07-08 | 重庆邮电大学 | Data privacy protection and completeness verification method based on Top-k inquiry in WSN |
Non-Patent Citations (3)
Title |
---|
CONG WANG ET.AL: ""Enabling Secure and Efficient Ranked Keyword Enabling secure and efficient ranked keyword search over outsourced cloud data"", 《IEEE TRANSACTIONS ON PARALLEL AND DISTRUIBUTED SYSTEMS》 * |
CONG WANG ET.AL: ""Secure Ranked Keyword Search over Encrypted Cloud Data"", 《2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS》 * |
戴华 等: ""面向隐私保护的两层传感网Top_k查询处理方法"", 《计算机研究与发展》 * |
Also Published As
Publication number | Publication date |
---|---|
CN107194282B (en) | 2020-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Verifiable Diversity Ranking Search Over Encrypted Outsourced Data. | |
CN103270516B (en) | System and method for securing virtual machine computing environments | |
US9536067B1 (en) | Password submission without additional user input | |
Ge et al. | Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing | |
EP3602457B1 (en) | System and method for blockchain-based data management | |
CN100424704C (en) | Full text search system based on ciphertext | |
CN106936771A (en) | A kind of secure cloud storage method and system based on graded encryption | |
Zhang et al. | Catch you if you misbehave: Ranked keyword search results verification in cloud computing | |
CN106407447A (en) | Simhash-based fuzzy sequencing searching method for encrypted cloud data | |
CN103038750A (en) | Systems and methods for securing data in motion | |
CN115314295B (en) | Block chain-based searchable encryption technical method | |
CN103024035B (en) | Safe and energy-saving encryption searching method based on mobile cloud platform | |
CN103095733A (en) | Keyword cipher text retrieval method for cloud storage | |
CN108363689A (en) | Secret protection multi-key word Top-k cipher text retrieval methods towards mixed cloud and system | |
US20190288833A1 (en) | System and Method for Securing Private Keys Behind a Biometric Authentication Gateway | |
Wang et al. | PeGraph: A system for privacy-preserving and efficient search over encrypted social graphs | |
Li et al. | VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data | |
Li et al. | A blockchain-based credible and secure education experience data management scheme supporting for searchable encryption | |
Yang et al. | A secure heuristic semantic searching scheme with blockchain-based verification | |
CN110149198A (en) | A kind of autonomous system and method that safeguard protection and storage controllably are carried out to data | |
CN114118438A (en) | Privacy protection machine learning training and reasoning method and system based on block chain | |
Abduljabbar et al. | Secure biometric image retrieval in IoT-cloud | |
Zhang et al. | A blockchain based searchable encryption scheme for multiple cloud storage | |
CN107194282A (en) | It is a kind of to can verify that single keyword Top k search methods towards cloud computing | |
CN104009851B (en) | A kind of bank net one-time pad two-way authentication secure log technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20170922 Assignee: NUPT INSTITUTE OF BIG DATA RESEARCH AT YANCHENG Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS Contract record no.: X2020980007071 Denomination of invention: A verifiable single keyword Top-k retrieval method for Cloud Computing Granted publication date: 20200414 License type: Common License Record date: 20201026 |
|
EE01 | Entry into force of recordation of patent licensing contract |